Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Aaron Wilson4 min read

Time to Upgrade your MFA for FedRAMP!

A phishing-resistant MFA is now required for FedRAMP.
Start Reading
Cody Bench2 min read

An Ounce of Prevention is Truly Worth a Pound of Cure

With so many threat actors looking for easy ways to breach your systems, it makes sense ...
Start Reading
Greg Peterson7 min read

Learning in the Cloud

Whether you're new to the industry or a seasoned Infrastructure Technology professional, ...
Start Reading
Anthony DiMarco7 min read

GitHub Actions on AWS: How to Implement Identity Federation

Using GitHub Actions to manage resources in AWS? Good news: With OIDC, you can configure ...
Start Reading
Alexandria Leary6 min read

6 Steps to PCI Assessment Success

If your company processes, stores, or transmits credit card payments, it must be PCI ...
Start Reading
Haya Ahmed7 min read

GKE Workload Identity

Discover how GKE Workload Identity improves the security of your GKE workloads & get ...
Start Reading
Jack Ryan9 min read

Understanding AWS Service Control Policies

An introduction to AWS Service Control Policies, their application, and the simple, ...
Start Reading
Dennis Chow7 min read

Exploit SSRF to gain AWS Credentials

Learn how Server Side Request Forgeries (SSRF) can abuse the default AWS instance ...
Start Reading
Anthony DiMarco7 min read

Identity Federation for GitHub Actions on AWS

Securing access to AWS resources for GitHub Actions workflows with OpenID Connect ...
Start Reading
Sarah Gori9 min read

Zero Trust in the Cloud

What is Zero Trust and how does it work in the Cloud?
Start Reading